Phishing dark waters the offensive and defensive sides of malicious emails

"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the vie...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hadnagy, Christopher (VerfasserIn), Fincher, Michele (VerfasserIn)
Weitere Verfasser: Dreeke, Robin (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, IN Wiley [2015]
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-108522806
003 DE-627-1
005 20241001123219.0
007 cr uuu---uuuuu
008 241001s2015 xx |||||o 00| ||eng c
020 |a 9781118958490  |c electronic bk.  |9 978-1-118-95849-0 
020 |a 1118958497  |c electronic bk.  |9 1-118-95849-7 
020 |a 9781118958483  |c electronic bk.  |9 978-1-118-95848-3 
020 |a 1118958489  |c electronic bk.  |9 1-118-95848-9 
020 |a 9781119183624  |9 978-1-119-18362-4 
020 |a 1119183626  |9 1-119-18362-6 
035 |a (DE-627-1)108522806 
035 |a (DE-599)KEP108522806 
035 |a (ORHE)9781118958483 
035 |a (DE-627-1)108522806 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a SOC  |2 bisacsh 
082 0 |a 364.1632  |2 23 
100 1 |a Hadnagy, Christopher  |e VerfasserIn  |4 aut 
245 1 0 |a Phishing dark waters  |b the offensive and defensive sides of malicious emails  |c Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke 
264 1 |a Indianapolis, IN  |b Wiley  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource  |b color illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Print version record 
520 |a "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description 
650 0 |a Phishing 
650 0 |a Electronic mail messages 
650 0 |a Electronic mail systems 
650 4 |a Hameçonnage 
650 4 |a Courrier électronique 
650 4 |a electronic mail 
650 4 |a SOCIAL SCIENCE ; Criminology 
650 4 |a Electronic mail systems 
650 4 |a Electronic mail messages 
650 4 |a Phishing 
700 1 |a Fincher, Michele  |e VerfasserIn  |4 aut 
700 1 |a Dreeke, Robin  |e MitwirkendeR  |4 ctb 
776 1 |z 9781118958476 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781118958476 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781118958483/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-108522806
_version_ 1818767365120196609
adam_text
any_adam_object
author Hadnagy, Christopher
Fincher, Michele
author2 Dreeke, Robin
author2_role ctb
author2_variant r d rd
author_facet Hadnagy, Christopher
Fincher, Michele
Dreeke, Robin
author_role aut
aut
author_sort Hadnagy, Christopher
author_variant c h ch
m f mf
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)108522806
(DE-599)KEP108522806
(ORHE)9781118958483
dewey-full 364.1632
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.1632
dewey-search 364.1632
dewey-sort 3364.1632
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04091nam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-108522806</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123219.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958490</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-95849-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958497</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-95849-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958483</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-95848-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958489</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-95848-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183624</subfield><subfield code="9">978-1-119-18362-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183626</subfield><subfield code="9">1-119-18362-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108522806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118958483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522806</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.1632</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing dark waters</subfield><subfield code="b">the offensive and defensive sides of malicious emails</subfield><subfield code="c">Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hameçonnage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Courrier électronique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">electronic mail</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fincher, Michele</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dreeke, Robin</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118958476</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118958476</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118958483/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-108522806
illustrated Illustrated
indexdate 2024-12-18T08:48:43Z
institution BVB
isbn 9781118958490
1118958497
9781118958483
1118958489
9781119183624
1119183626
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource color illustrations
psigel ZDB-30-ORH
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Wiley
record_format marc
spelling Hadnagy, Christopher VerfasserIn aut
Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Indianapolis, IN Wiley [2015]
©2015
1 online resource color illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Print version record
"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description
Phishing
Electronic mail messages
Electronic mail systems
Hameçonnage
Courrier électronique
electronic mail
SOCIAL SCIENCE ; Criminology
Fincher, Michele VerfasserIn aut
Dreeke, Robin MitwirkendeR ctb
9781118958476
Erscheint auch als Druck-Ausgabe 9781118958476
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781118958483/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Hadnagy, Christopher
Fincher, Michele
Phishing dark waters the offensive and defensive sides of malicious emails
Phishing
Electronic mail messages
Electronic mail systems
Hameçonnage
Courrier électronique
electronic mail
SOCIAL SCIENCE ; Criminology
title Phishing dark waters the offensive and defensive sides of malicious emails
title_auth Phishing dark waters the offensive and defensive sides of malicious emails
title_exact_search Phishing dark waters the offensive and defensive sides of malicious emails
title_full Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
title_fullStr Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
title_full_unstemmed Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
title_short Phishing dark waters
title_sort phishing dark waters the offensive and defensive sides of malicious emails
title_sub the offensive and defensive sides of malicious emails
topic Phishing
Electronic mail messages
Electronic mail systems
Hameçonnage
Courrier électronique
electronic mail
SOCIAL SCIENCE ; Criminology
topic_facet Phishing
Electronic mail messages
Electronic mail systems
Hameçonnage
Courrier électronique
electronic mail
SOCIAL SCIENCE ; Criminology
url https://learning.oreilly.com/library/view/-/9781118958483/?ar
work_keys_str_mv AT hadnagychristopher phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails
AT finchermichele phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails
AT dreekerobin phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails